Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 00:57

General

  • Target

    JaffaCakes118_8413e18f4f81fedd8ff3507d1d5c98124a2ecce21a743e0e5f0ee810bcb88a04.exe

  • Size

    726.8MB

  • MD5

    c26f79088276bb0d3d8331bf2a1aa254

  • SHA1

    da5820a87543571ca684d1d0a7271143972ae77e

  • SHA256

    8413e18f4f81fedd8ff3507d1d5c98124a2ecce21a743e0e5f0ee810bcb88a04

  • SHA512

    7c3484e0f43a7ecf6141021fdafaa8aa18a10ce7838da86a1931ee5e8f87227addf8b12a8e3cfb5980358942b7fd6c44d44198471212fc9cd8d5ce62b9b1cda4

  • SSDEEP

    196608:GGwDS7B4Xg1IJkXPMo4fZSM+kvV32DpW/b/Cs:GGBV4Xg1IJkf8wkvOsL

Malware Config

Extracted

Family

raccoon

Botnet

8c3e4aa007fb2f2defacc1f952806f72

C2

http://85.192.40.253/

http://170.75.160.9/

http://79.137.195.240/

Attributes
  • user_agent

    23591

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 3 IoCs
  • Raccoon family
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8413e18f4f81fedd8ff3507d1d5c98124a2ecce21a743e0e5f0ee810bcb88a04.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8413e18f4f81fedd8ff3507d1d5c98124a2ecce21a743e0e5f0ee810bcb88a04.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-0-0x000000000041E000-0x00000000007A6000-memory.dmp

    Filesize

    3.5MB

  • memory/1504-2-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

    Filesize

    4KB

  • memory/1504-1-0x0000000002CC0000-0x0000000002CC1000-memory.dmp

    Filesize

    4KB

  • memory/1504-5-0x0000000000400000-0x0000000000E67000-memory.dmp

    Filesize

    10.4MB

  • memory/1504-3-0x0000000000400000-0x0000000000E67000-memory.dmp

    Filesize

    10.4MB

  • memory/1504-6-0x000000000041E000-0x00000000007A6000-memory.dmp

    Filesize

    3.5MB

  • memory/1504-7-0x0000000000400000-0x0000000000E67000-memory.dmp

    Filesize

    10.4MB